 |
1 |  |  In __________cryptography, the same key is used by the sender (for encryption) and the receiver (for decryption). |
|  | A) | symmetric-key |
|  | B) | asymmetric-key |
|  | C) | public-key |
|  | D) | None of the choices are correct |
 |
 |
2 |  |  In _________ cryptography, the same key is used in both directions. |
|  | A) | symmetric-key |
|  | B) | asymmetric-key |
|  | C) | public-key |
|  | D) | None of the choices are correct |
 |
 |
3 |  |  _________ cryptography is often used for long messages. |
|  | A) | Symmetric-key |
|  | B) | Asymmetric-key |
|  | C) | public-key |
|  | D) | None of the choices are correct |
 |
 |
4 |  |  ___________ cryptography is often used for short messages. |
|  | A) | Symmetric-key |
|  | B) | Asymmetric-key |
|  | C) | Secret-key |
|  | D) | None of the choices are correct |
 |
 |
5 |  |  __________means that the sender and the receiver expect confidentiality. |
|  | A) | Non-repudiation |
|  | B) | Integrity |
|  | C) | Authentication |
|  | D) | None of the choices are correct |
 |
 |
6 |  |  ___________ means that the data must arrive at the receiver exactly as they were sent. |
|  | A) | Non-repudiation |
|  | B) | Message integrity |
|  | C) | Authentication |
|  | D) | None of the choices are correct |
 |
 |
7 |  |  ______________ means that the receiver needs to be sure of the sender identity and that an imposter has not sent the message. |
|  | A) | Non-repudiation |
|  | B) | Message integrity |
|  | C) | Message authentication |
|  | D) | None of the choices are correct |
 |
 |
8 |  |  ______________ can provide authentication, integrity, and nonrepudiation for a message. |
|  | A) | Encryption/decryption |
|  | B) | Digital signature |
|  | C) | Compression |
|  | D) | None of the choices are correct |
 |
 |
9 |  |  Digital signature does not provide _________. |
|  | A) | non-repudiation |
|  | B) | privacy |
|  | C) | authentication |
|  | D) | provides all of the above |
 |
 |
10 |  |  In ___________, the entity identity is verified once for the entire duration of system access. |
|  | A) | entity authentication |
|  | B) | message integrity |
|  | C) | message authentication |
|  | D) | None of the choices are correct |
 |
 |
11 |  |  In __________ cryptography, everyone has access to everyone's public key. |
|  | A) | symmetric-key |
|  | B) | asymmetric-key |
|  | C) | secret-key |
|  | D) | None of the choices are correct |
 |
 |
12 |  |  After a message is encrypted, it is called _______. |
|  | A) | plaintext |
|  | B) | ciphertext |
|  | C) | cryptotext |
|  | D) | None of the choices are correct |
 |
 |
13 |  |  If 20 people need to communicate using symmetric-key cryptography, _______ symmetric keys are needed. |
|  | A) | 19 |
|  | B) | 20 |
|  | C) | 190 |
|  | D) | 200 |
 |
 |
14 |  |  In the asymmetric-key method of cryptography, which key is publicly known? |
|  | A) | encryption key only |
|  | B) | decryption key only |
|  | C) | both keys |
|  | D) | None of the choices are correct |
 |
 |
15 |  |  In the asymmetric-key method of cryptography, the receiver has possession of the _______. |
|  | A) | private key |
|  | B) | public key |
|  | C) | none of the keys |
|  | D) | None of the choices are correct |
 |
 |
16 |  |  The RSA algorithm uses _______ cryptography method. |
|  | A) | an asymmetric-key |
|  | B) | a private-key |
|  | C) | a symmetric-key |
|  | D) | None of the choices are correct |
 |
 |
17 |  |  If user A wants to send an encrypted message to user B, the plaintext is encrypted with the public key of _______. |
|  | A) | user A |
|  | B) | user B |
|  | C) | the network |
|  | D) | None of the choices are correct |
 |
 |
18 |  |  In the digital signature technique when the whole message is signed using an asymmetric key, the sender of the message uses _______ to sign the message. |
|  | A) | his or her own symmetric key |
|  | B) | his or her own private key |
|  | C) | his or her own public key |
|  | D) | None of the choices are correct |
 |
 |
19 |  |  In the digital signature technique when the whole message is signed using an asymmetric key, the receiver of the message uses _______ to verify the signature. |
|  | A) | her or his own symmetric key |
|  | B) | her or his own private key |
|  | C) | the sender's public key |
|  | D) | None of the choices are correct |
 |
 |
20 |  |  A _______ is a trusted third party that solves the problem of symmetric-key distribution. |
|  | A) | CA |
|  | B) | KDC |
|  | C) | TLS |
|  | D) | firewall |
 |
 |
21 |  |  A _______ certifies the binding between a public key and its owner. |
|  | A) | CA |
|  | B) | KDC |
|  | C) | TLS |
|  | D) | None of the choices are correct |
 |